Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,758 Article Results

A Modified Diagonal Mesh Shuffle Exchange Interconnection Network

10.11591/.v7i2.pp1042-1050
Akash Punhani , Pardeep Kumar , Nitin Nitin
Interconnection network is an important part of the digital system. The interconnection mainly describes the topology of the network along with the routing algorithm and flow control mechanism. The topology of the network plays an important role on the performance of the system. Mesh interconnection network was the simplest topology, but has the limited bisection bandwidth on the other hand torus and diagonal mesh was having long links. The Modified diagonal mesh network tried to replace the torodial links but was having more average path length so in proposed topology we have tried to improve the average distance using shuffle exchange network over the boundary node. In this paper, we propose the architecture of Modified Diagonal Mesh Shuffle Exchange Interconnection Network. This Modified Diagonal Mesh Shuffle Exchange Interconnection network have been compared with four popular topologies that are simple 2D Mesh, 2D Torus, Diagonal Mesh and Modified Diagonal Mesh Interconnection Network on the four traffic patterns such as Bit Complement traffic, Neighbor traffic, Tornado traffic and Uniform traffic are used for comparisonand performance analysis. We have performed the analysis with a 5% and 10% of hotspot on the Uniform Traffic. The simulation results shows that the proposed topology is performed better on bit complement traffic and can also handle the other traffic up to certain level.
Volume: 7
Issue: 2
Page: 1042-1050
Publish at: 2017-04-01

DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques

10.11591/.v7i2.pp1032-1041
John Mark Espalmado , Edwin Arboleda
Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength and cover each algorithm’s weaknesses, a new security algorithm can be designed using the combination of different cryptographic techniques. This design uses Digital Signature Algorithm (DSA) for authentic key generation, Data Encryption Standard (DES) for key scheduling, and Advanced Encryption Standard (AES) and Rivest–Schamir–Adleman Algorithm (RSA) in encrypting data. This new security algorithm has been proposed for improved security and integrity by integration of these cryptographic techniques.
Volume: 7
Issue: 2
Page: 1032-1041
Publish at: 2017-04-01

Video Monitoring Application using Wireless Sensor Node with Various External Antenna

10.11591/ijeecs.v6.i1.pp148-154
Amerrul Zabri , Mohamad Kamal A. Rahim , Farid Zubir , Norsaidah Muhamad Nadzir , Huda A. Majid
Surveillance and monitoring has become very important for security reasons these days. The use of wireless sensor node device offers a variety of platform depends on the attached sensor. When an image sensor is attached, the wireless sensor node is capable of monitoring an area wirelessly. Since wireless environment uses antenna to transmit and receive data, antenna is an important component that affects the video monitoring performance. This paper describes a surveillance system using Raspberry Pi with various external antenna. The Raspberry Pi with Pi Camera module and various types of antennas was used for testing and experimentation in line-of-sight (LOS) and non-line-of-sight (NLOS) condition. The results revealed that the Yagi Uda antenna gives the best output in terms of its signal strength and average Receive (Rx) rate.
Volume: 6
Issue: 1
Page: 148-154
Publish at: 2017-04-01

Detection of Rogue Access Point in WLAN using Hopfield Neural Network

10.11591/.v7i2.pp1060-1070
Menal Dahiya , Sumeet Gill
The serious issue in the field of wireless communication is the security and how an organization implements the steps against security breach. The major attack on any organization is Man in the Middle attack which is difficult to manage. This attack leads to number of unauthorized access points, called rogue access points which are not detected easily. In this paper, we proposed a Hopfield Neural Network approach for an automatic detection of these rogue access points in wireless networking. Here, we store the passwords of the authentic devices in the weight matrix format and match the patterns at the time of login. Simulation experiment shows that this method is more secure than the traditional one in WLAN.
Volume: 7
Issue: 2
Page: 1060-1070
Publish at: 2017-04-01

An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protocol in VANET under Non-saturated Conditions

10.11591/.v7i2.pp999-1011
Akram A. Almohammedi , Nor K. Noordin , A. Sali , Fazirulhisyam Hashim , Abdulmalek Al-Hemyari
Vehicular Ad Hoc Networks (VANETs) is a technology supporting two types of applications, safety and service applications with higher and lower priorities respectively. Thereby, Medium Access Control (MAC) protocol is designed to provide reliable and efficient data broadcasting based on prioritization. Different from the IEEE 1609.4 (legacy), HER-MAC protocol is a new multi-channel MAC proposed for VANETs, offering remarkable performance with regards to safety applications transmission. This paper focuses on the analysis of packet delivery ratio of the HER-MAC protocol under non-saturated conditions. 1-D and 2-D Markov chains have been developed for safety and non-safety applications respectively, to evaluate mathematically the performance of HER-MAC protocol. The presented work has taken into account the freezing of the backoff timer for both applications and the backoff stages along with short retry limit for non-safety applications in order to meet the IEEE 802.11p specifications. It highlights that taking these elements into consideration are important in modeling the system, to provide an accurate estimation of the channel access, and guarantees that no packet is served indefinitely. More precise results of the system packet delivery ratio have been yield. The probability of successful transmission and collisions were derived and used to compute the packet delivery ratio. The simulation results validate the analytical results of our models and indicate that the performance of our models outperformed the existing models in terms of the packet delivery ratio under different number of vehicles and contention window.
Volume: 7
Issue: 2
Page: 999-1011
Publish at: 2017-04-01

Optical Humidity Sensor Based on Tapered Fiber with Multi-walled Carbon Nanotubes Slurry

10.11591/ijeecs.v6.i1.pp97-103
Habibah Mohamed , Ninik Irawati , Fauzan Ahmad , Mohd Haniff Ibrahim , Sumiaty Ambran , Mohd Azizi Abdul Rahman , Sulaiman Wadi Harun
We demonstrated performance comparison of optical humidity sensor for bare and Multi-walled carbon nanotubes (MWCNTs) slurry coated tapered optical fiber. The starting material for MWCNTs slurry is MWCNTs- acrylonitrile butadiene styrene (ABS) based fused deposition modeling (FDM) 3D printer filament. The ABS was dissolved using acetone to produce MWCNTs-acetone suspension. The MWCNTs-acetone suspension was drop-casted on the tapered fiber to produce MWCNTs slurry by evaporation process at room temperature, which resulted the MWCNTs slurry attach to the tapered fiber. The MWCNTs slurry acts as the cladding for humidity changes measurement. The experimental works showed improvement of sensitivity from 3.811 μW/% of bare tapered fiber to 5.17 μW/% for the coated tapered fiber with MWCNTs slurry when the humidity varied from 45% to 80%.
Volume: 6
Issue: 1
Page: 97-103
Publish at: 2017-04-01

A Tunable Ferrofluid-based Polydimethylsiloxane (PDMS) Microchannel Inductor for Ultra High Frequency Applications

10.11591/.v7i2.pp926-932
Ahmad Hafiz Mohamad Razy , Mohd Tafir Mustaffa , Asrulnizam Abd Manaf , Norlaili Mohd Noh
In this work, a tunable ferrofluid-based polydimethylsiloxane (PDMS) microchannel inductor with high quality factor and high tuning range is proposed. For this project, PDMS is used to create a microchannel with a width and height of 0.53 mm and 0.2 mm respectively. The microchannel is then used to cover the whole design of a solenoid inductor. A solenoid inductor is designed using wire bonding technique where lines of copper and bond wires are used to form a solenoid winding on top of silicon substrate. A light hydrocarbon based ferrofluid EMG 901 660 mT with high permeability of 5.4 is used. The ferrofluid-based liquid is injected into the channel to enhance the performance of a quality factor. A 3D full-wave electromagnetic fields tool, ANSYS HFSS is used in this work to simulate the solenoid inductor. The results obtained in this work gives a quality factor of more than 10 at a frequency range of 300 MHz to 3.3 GHz (Ultra High Frequency range). The highest quality factor is 37 which occurs at a frequency of 1.5 GHz, provides a high tuning range of 112%.
Volume: 7
Issue: 2
Page: 926-932
Publish at: 2017-04-01

Fault Identification of In-Service Power Transformer using Depolarization Current Analysis

10.11591/.v7i2.pp559-567
M.A. Talib , N.A. Muhamad , Z.A. Malek , B.T. Phung
Preventive diagnostic testing of in-service power transformers require system outage and expert’s knowledge and experiences in interpreting the measurement results. The chemical oil analysis may cause significant variance to measurement results due to the different practices in oil sampling, storage, handling and transportation. Thus, a cost effective measuring technique by means of a simpler method that is able provide an accurate measurement results is highly required. The extended application of Polarization and Depolarization Current (PDC) measurement for characterization of different faults conditions on in-service power transformer has been presented in this paper. The oil sample from in-service power transformers with normal and 3 different faults type conditions were sampled and tested for Dissolved Gases Analysis (DGA) and PDC measurement. The DGA results was used to confirm type of faults inside the transformer while the PDC pattern of oil with normal, partial discharge, overheating and arcing were correlated to the oil sample conditions. The analysis result shows that depolarization current provides significant information to defferenciate fault types in power transformer. Thus this finding provides a new alternative in identifying incipient faults and such knowledge can be used to avoid catastrophic failures of power transformers.
Volume: 7
Issue: 2
Page: 559-567
Publish at: 2017-04-01

Maximum Power Point Tracking using Particle Swarm Optimization Algorithm for Hybrid Wind-Tidal Harvesting System on the South Coast of Java

10.11591/.v7i2.pp659-666
Fransisco Danang Wijaya , Kukuh Daud Pribadi , Sarjiya Sarjiya
This paper proposes a hybrid wind-tidal harvesting system (HWTHS). To extract maximum power from the wind and tidal, HWTHS implements particle swarm optimization (PSO) algorithm in maximum power point tracking (MPPT) method. The proposed HWTHS had been tested on the range of possible input appropriate to the characteristics of the southern coast of Java. The presented result shows that by using PSO-based MPPT algorithm, maximum power point can be achieved. Thus the efficiency of HWTHS is 92 %, 94 % in wind section and 91 % in tidal section. By using PSO-based MPPT, HWTHS can respond well to changes in wind and tidal speed, whether it's a change from low speed to a higher speed or change from high speed to lower speed wherein time to reach new steady state is ± 0.1 s. At varied wind and tidal speed, PSO algorithm can maintain Cp of the system in the range of 0.47 - 0.48 so that power can be extracted to the maximum.
Volume: 7
Issue: 2
Page: 659-666
Publish at: 2017-04-01

A Training Monitoring System for Cyclist Based on Wireless Sensor Networks

10.11591/ijeecs.v6.i1.pp80-87
N. M. Abdul Latiff , M. A. Ruslee , S. K. Syed Yusof , M. R. Abdul Rahim , H. Sayuti , K. Mohamad Yusof , M. A. Baharudin
This paper presents a training monitoring system for cyclist that is based on the technology of wireless sensor networks (WSNs). A stable and reliable wireless cyclist monitoring system is vital to establish a smart and efficient sports management program. A training monitoring system has been developed and tested in a real cyclist training environment in a velodrome. The system is designed is such a way that the packet loss rate is minimum. Using TelG mote as the basis, customized sensor nodes that function as a forwarder node and the relay nodes are developed to form the WSN. This WSN is linked to the cloud network on the Internet. The cloud network is then established and end users application for data accessing is designed. Several experiments have been conducted in a real scenario in a velodrome to measure the reliability of the system architecture. It is shown from the experiments that the proposed system is reliable even when the cyclist is moving at a high speed. The packet loss is less than 2% which does not give a huge impact to the data transmission.
Volume: 6
Issue: 1
Page: 80-87
Publish at: 2017-04-01

Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography

10.11591/.v7i2.pp799-809
Ebrahim Alrashed , Suood Suood Alroomi
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message.  In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
Volume: 7
Issue: 2
Page: 799-809
Publish at: 2017-04-01

p-Laplace Variational Image Inpainting Model Using Riesz Fractional Differential Filter

10.11591/.v7i2.pp850-857
Sridevi Gamini , S Srinivas Kumar
In this paper, p-Laplace variational image inpainting model with symmetric Riesz fractional differential filter is proposed. Variational inpainting models are very useful to restore many smaller damaged regions of an image. Integer order variational image inpainting models (especially second and fourth order) work well to complete the unknown regions. However, in the process of inpainting with these models, any of the unindented visual effects such as staircasing, speckle noise, edge blurring, or loss in contrast are introduced. Recently, fractional derivative operators were applied by researchers to restore the damaged regions of the image. Experimentation with these operators for variational image inpainting led to the conclusion that second order symmetric Riesz fractional differential operator not only completes the damaged regions effectively, but also reducing unintended effects. In this article, The filling process of damaged regions is based on the fractional central curvature term. The proposed model is compared with integer order variational models and also GrunwaldLetnikov fractional derivative based variational inpainting in terms of peak signal to noise ratio, structural similarity and mutual information.
Volume: 7
Issue: 2
Page: 850-857
Publish at: 2017-04-01

Maintenance and Safety Requirements of Flameproof and Intrinsically Safe Equipment for Coal Mines

10.11591/ijeecs.v6.i1.pp9-15
B. Ahirwal , Arvind kumar singh , Rajendra kumar vishwakarm
In the generation of the new technology segment, new explosionproof (Ex) equipment are being installed to make systems suitable for use in hazardous areas of mines. Generally, 80-90% equipment having flameproof (Exd) and intrinsic safety (Exi) methodology of protection are used in the mines for safe operation. The maintenance and safety are two vital parameters to improve the system efficiency of installation in the mines. These parameters are also responsible for the productivity of the mines. The minimum breakdown and maximum safety are the prime concerns of the mines to increase the production. Many observations and basic knowledge are necessary of safety parameters of Ex protections while doing maintenance because micro joules energy is sufficient to ignite the hazardous areas of mines. Trained and skilled personals having good knowledge of Ex protections are required to maintain the limitations of ignition energy sources of Ex equipment to prevent explosion in the mines. A regular and organized scheme of inspection and maintenance may ensure continued, satisfactory and safe operation of Ex electrical equipment in mines. The important points for safety and maintenance of Exd and Exi equipment are pondered in this paper.
Volume: 6
Issue: 1
Page: 9-15
Publish at: 2017-04-01

Power Quality Enhancement in Grid Connected PV Systems using High Step Up DC-DC Converter

10.11591/.v7i2.pp720-728
V S Prasadarao K , K V Krishna Rao , P Bala Koteswara Rao , T. Abishai
Renewable energy sources (RES) are gaining more importance in the present scenario due to the depletion of fossil fuels and increasing power demand. Solar energy is the one of the most promising as it is clean and easily available source. The voltage obtained from the PV system is low. This voltage is increased by high step up dc-dc converter which uses only one switch leads to low switching losses and hence the efficiency of this converter is high. To get the good response this converter is operated in closed loop manner. Integration of PV system with existing grid has so many issues like distorted voltage, current and reactive power control etc. This paper presents a four leg inverter which works on hysteresis current control technique to address the power quality issues like reactive power compensation, balanced load currents and compensation of neutral current. The switching to the inverter is designed in such a way that it supplies the extra current to stabilise the current of the grid that is being supplied to the loads. Finally, the proposed technique is validated by using mat lab/Simulink software and corresponding results are presented in this paper.
Volume: 7
Issue: 2
Page: 720-728
Publish at: 2017-04-01

Vertical Information System: A Case Study of Civil Servant Teachers’ Data in Manado City

10.11591/ijeecs.v6.i1.pp42-49
Julyeta P.A. Runtuwene , Irene R.H.T Tangkawarow
Information systems have become important factors in a company, where information systems are useful in providing useful information for the company itself. The information system helps companies implement corporate activities at the beginning of the process until the decision making. In the concept Information system, we know the term of vertical information system, which is another strategy for increasing vertical information capacity. Vertical information system includes the periodic report, written information, and computer-based communications distributed to managers. In this article, discusses the approach in the development of vertical information system which will be preceded by comparison of operational systems, management information systems, and business intelligence systems. We will give explanations about the role in the BI system in an organization, the challenges faced in the implementation of vertical information systems, approaches in vertical information systems, approaches that we choose, and how it implement in  civil servant teachers data in Manado City. 
Volume: 6
Issue: 1
Page: 42-49
Publish at: 2017-04-01
Show 1559 of 1984

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration